Robust Median Filtering Detection Based on Filtered Residual
In multimedia forensics, exposing an image’s processing history draws much attention. Median filtering is a popular noise removal tool, which has been used as a popular anti-forensics tool recently. An image is usually saved in a compressed format such as the JPEG format. While the detection of median filtering from a JPEG compressed image is difficult because typical filter characteristics are suppressed by JPEG quantization and block artifacts. In this paper, we introduce a novel forensic trace – median filter residual. Median filtering is first applied on a test image, and the difference between the initial image and the filtered output image is called the median filter residual. The filtered residual is used as the forensic fingerprint. Thus, the interference from the image edge and texture which is regarded as a major limitation of the existing forensic methods can be reduced. Experimental results on a large image database show that the proposed method is very robust to JPEG post- compression, and achieves much better performance than the existing state-of-the-art works.
KeywordsDigital image Forensics Median filter residual Transition probability
Unable to display preview. Download preview PDF.
- 1.Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. In: Proc. SPIE, Electronic Imaging, Media Forensics and Security II, vol. 7541, pp. 1–12 (2010)Google Scholar
- 3.Cao, G., Zhao, Y., Ni, R., Yu, L., Tian, H.: Forensic detection of median filtering in digital images. In: Proc. 2010 IEEE Int. Conf. Multimedia and Expo. 2010, pp. 89–94 (2010)Google Scholar
- 6.Stamm, M., Liu, K.J.R.: Forensic estimation and reconstruction of a contrast enhancement mapping. In: International Conf. on Acoustics, Speech and Signal Processing, Dallas, Texas, USA (2010)Google Scholar
- 8.Dirik, A.E., Memon, N.: Image tamper detection based on demosaicing artifacts. In: International Conference Proceedings on Image Processing, Cairo, pp. 1497–1500 (2009)Google Scholar
- 10.Ker, A.D., Bohme, R.: Revisiting weighted stego-image stegoanalysis. In: Proceedings of SPIE, Electronic Imaging: Security, Forensics, Steganography and Watermarking of Multimedia Contents X, vol. 6819, p. 5 (2008)Google Scholar
- 13.Chuang, W.H., Swaminathan, A., Wu, M.: Tampering identification using empirical frequency response. In: Proc. IEEE Int. Conf. Acoust., Speech and Signal Processing, pp. 1517–1520 (2009)Google Scholar
- 14.Schaefer, G., Stich, M.: UCID-An uncompressed color image database. In: Proceedings of SPIE, Storage and Retrieval Methods and Applications for Multimedia, pp. 472–480 (2004)Google Scholar
- 15.Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2, 27:1–27:27 (2011)Google Scholar
- 18.Zo, D., Shi, Y.Q., Su, W., Xuan, G.: Steganalysis based on Markov model of thresholded prediction-error image. In: Proc. IEEE Int. Conf. Multimedia and Expo., Toronto, Canada, July 9-12, pp. 365–1368 (2006)Google Scholar